{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:08:21Z","timestamp":1745320101228,"version":"3.37.3"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Government of Korea (Ministry of Science and ICT","award":["2019-0-00197"],"award-info":[{"award-number":["2019-0-00197"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3127195","type":"journal-article","created":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T22:08:03Z","timestamp":1636582083000},"page":"152098-152114","source":"Crossref","is-referenced-by-count":6,"title":["Histogram Entropy Representation and Prototype Based Machine Learning Approach for Malware Family Classification"],"prefix":"10.1109","volume":"9","author":[{"given":"Byunghyun","family":"Baek","sequence":"first","affiliation":[]},{"given":"Seoungyul","family":"Euh","sequence":"additional","affiliation":[]},{"given":"Dongheon","family":"Baek","sequence":"additional","affiliation":[]},{"given":"Donghoon","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1840-9296","authenticated-orcid":false,"given":"Doosung","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0242-0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3077-6"},{"journal-title":"Vipr","year":"2021","key":"ref33"},{"journal-title":"VX heavens","year":"2021","key":"ref32"},{"journal-title":"Virus Total","year":"2021","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0248-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.01.002"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.016"},{"journal-title":"MALWARE","year":"2021","key":"ref35"},{"journal-title":"Analyzing Unknown Binaries","year":"2021","key":"ref34"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2986014"},{"key":"ref29","article-title":"Microsoft malware classification challenge","author":"ronen","year":"2018","journal-title":"arXiv 1802 10135"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0125-x"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08624-8_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15381-5_29"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.11.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857713"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-3702-4_2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-018-0323-0"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/34.709601","article-title":"The random subspace method for constructing decision forests","volume":"20","author":"ho","year":"1998","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"journal-title":"Deep Learning","year":"2016","author":"goodfellow","key":"ref51"},{"journal-title":"Fundamentals of machine learning for predictive data analytics algorithms worked examples and case studies","year":"2020","author":"kelleher","key":"ref55"},{"journal-title":"Keras","year":"2021","key":"ref54"},{"journal-title":"Xgboost","year":"2021","key":"ref53"},{"journal-title":"Scikit-Learn","year":"2021","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.053"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1599272.1599278"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258512"},{"key":"ref12","article-title":"Survey of nearest neighbor techniques","author":"bhatia","year":"2010","journal-title":"arXiv 1007 0085"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2103939"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.142"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1214\/11-AOAS495"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966355"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-010-9165-y"},{"key":"ref18","first-page":"43","article-title":"A survey of binary similarity and distance measures","volume":"8","author":"choi","year":"2010","journal-title":"Inform Syst"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/wics.70"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1186\/2190-8532-1-1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101861"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/659101"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/234313.234346"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.48"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.05.002"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1504\/IJDMMM.2018.095352"},{"key":"ref47","volume":"1","author":"vazirani","year":"2001","journal-title":"Approximation Algorithms"},{"key":"ref42","first-page":"187","article-title":"MutantX-S: Scalable malware clustering based on static features","author":"hu","year":"2013","journal-title":"Proc Annu Tech Conf"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0410"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0153-9"},{"journal-title":"The Cuckoos","year":"2021","key":"ref43"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09611252.pdf?arnumber=9611252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T21:06:02Z","timestamp":1641848762000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9611252\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3127195","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}